22 research outputs found
Hierarchical Structuring of a Workflow Model in Petri-Net
In this paper, we introduce the way of deriving hierarchical structure of a workflow model represented in classical Petrinet, even for the cases with cycles, which allows handling a workflow model efficiently. More specifically, our method identifies any block structures as candidates for the subprocesses and represents them as a single block node in the upper layer of the hierarchical model. The proposed method can make workflow analysis and design more accurate and efficient and further lead to a better design on a collaborate environment
Research on Role-Centric Collaborative Technology
With the development of e-business, the collaboration between enterprises is increasingly strengthened, which, at the same time, challenges coordination technologies in distributed enterprise transactions. Workflow management has as its priority the support of coordination functions and workflow interoperability points the way towards collaborative business environments. Though WfMC, Workflow Management Coalition, specifies the abstract interoperability, differences such as workflow concept models, ontology etc. cannot be dealt with effectively because the specification is only technical. On the other hand, portal technology focuses on the integration of information and application services customized according to roles. It can provide support for the interoperability of workflows. In this paper, workflows are integrated with portal technology. And a role centric collaborative environment is proposed which is a way out for problems existing in workflow interoperability
Managing Evolving Business Workflows through the Capture of Descriptive Information
Business systems these days need to be agile to address the needs of a
changing world. In particular the discipline of Enterprise Application
Integration requires business process management to be highly reconfigurable
with the ability to support dynamic workflows, inter-application integration
and process reconfiguration. Basing EAI systems on model-resident or on a
so-called description-driven approach enables aspects of flexibility,
distribution, system evolution and integration to be addressed in a
domain-independent manner. Such a system called CRISTAL is described in this
paper with particular emphasis on its application to EAI problem domains. A
practical example of the CRISTAL technology in the domain of manufacturing
systems, called Agilium, is described to demonstrate the principles of
model-driven system evolution and integration. The approach is compared to
other model-driven development approaches such as the Model-Driven Architecture
of the OMG and so-called Adaptive Object Models.Comment: 12 pages, 4 figures. Presented at the eCOMO'2003 4th Int. Workshop on
Conceptual Modeling Approaches for e-Busines
Web Service Based Universal Management of Workflow Resources
Implementing business process solutions in the way of Web service is being positioned in the center of workflow manag ement. However, there is no robust standard to expose and access workflow resources by Web service interfaces. In this paper, we propose a web service based workflow resource management framework named Universal Resource Manage ment Framework (URMF) with declarations of web service interfaces and interaction protocols among them. We also in troduce a substitutive workflow interface model employing Web services and URMF. Finally, a prototype implementati on model of URMF with J2EE platform is also introduced
A Two Phase Verification Algorithm for Cyclic Workflow Graphs
The widespread automation of e-business processes has made workflow analysis and design an integral part of information management. Graph-based workflow models enables depicting complex processes in a fairly compact form. This free form, on the other hand, can yield models that may fail depending on the judgment of the modeler and create modeling situations that cannot be executed or will behave in a manner not expected by the modeler. Further, cycles in workflow models needed for purposes of rework and information feedback increase the complexity of workflow analysis. This paper presents a novel method of partitioning a cyclic workflow process, represented in a directed graph, into a set of acyclic subgraphs. This allows a cyclic workflow model to be analyzed further with several smaller subflows, which are all acyclic. As a convincing example, we present two-phased verification of structural conflicts in workflow models for those incurred from the inappropriate composition of partitioned flows and the others within each acyclic subgraph, which is much easier to comprehend and verify individually than the whole workflow model, in general
Workflow Management Systems and ERP Systems: Differences, Commonalities, and Applications
Two important classes of information systems, Workflow Management Systems(WfMSs) and Enterprise Resource Planning (ERP) systems, have been used to support e-business process redesign, integration, and management. While both technologies can help with business process automation, data transfer, and information sharing, the technological approach and features of solutions provided by WfMS and ERP are different. Currently, there is a lack of understanding of these two classes of information systems in the industry and academia, thus hindering their effective applications. In this paper, we present a comprehensive comparison between these two classes of systems. We discuss how the two types of systems can be used independently or together to develop intra- and inter-organizational application solutions. In particular, we also explore the roles of WfMS and ERP in the next generation of IT architecture based on web services. Our findings should help businesses make better decisions in the adoption of both WfMS and ERP in their e-business strategies
Inherent Dangers in Database Security
Abstract-With the danger/ risk of data theft looming large over the horizon of the Internet user involved in e-banking, online shopping, transaction etc. it becomes imperative to identify the dangers involved and employ security checks. Usually big stores have secure SSL [1] connections to be used by the owners of credit cards. Use of base64 encoding instead of hexadecimal and similarly using AES-12